CISA 4 and 5

Card Set Information

Author:
Anonymous
ID:
307193
Filename:
CISA 4 and 5
Updated:
2015-09-02 23:22:15
Tags:
CISA
Folders:

Description:
CISA 4 5
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. IT Infrastructure Library (ITIL)
    A series of documents that can be used to aid the implmenetation of a framework for IT service management (ITSM)
  2. Delta release
    A partial release, contains only those items that have undergone changes since the last release
  3. Problem Management vs. Incident Management
    • Problem management's objective is to reduce the number and severity of incidents
    • Incident management's objective is to return the effected business process back to its normal state as quickly as possible
  4. What do QA personnel do?
    Verify that system changes are authorized, tested, and implemented in a controlled manner prior to being introduced into the production environment
  5. Capacity management
    The planning and monitoring of computing and network resources to ensure that the available resources are used efficiently and effectively
  6. Hierarchical database characteristics
    • Parents and children
    • 1:N mappings between records
    • A child may have one parent
  7. Network database characteristics
    • Basic data modeling construct is a set
    • A set is formed by an owner, a member, and a name
    • A member can have a role in one or more sets
    • An owner can be a member or owner of another set
    • A set is usually 1:N but can be 1:1
    • Complex, hard to query
  8. Relational database characteristics
    • Data and relationships are tables
    • A table is rows (tuples or records) and columns
    • Rows have the same columns
    • Columns (domains or attributes) have fields
    • Values are atomic
    • Each row is unique
    • Each column name is unique
    • Sequences of rows and columns don't matter
  9. Normalization means:
    • The elimination of redundant data
    • Objective is to minimize the amount of information, quicker queries, better integrity
  10. Normalization rules
    • A given instance of a data object has one and only one value for each attribute
    • Attributes represent elementary data
    • Each row consists of a primary key that ids some entity 
    • A foreign key has a null value or an existing value link to another table (referential integrity)
  11. Dedicated vs switched circuit
    • Dedicated - symmetric telecom lines connecting 2 locations, permanently connected
    • Switch - not permanent, setup on demand
  12. Two types of switched circuits
    • Circuit switching - like a phone
    • Packet switching
  13. Baseband vs Broadband
    • Baseband - one channel available, entire capacity used to transmit, moves in one direction
    • Broadband - different frequencies, full-duplex
  14. OSI Architecture
    • All People Seem To Need Data Protocols
    • Application
    • Presentation
    • Session
    • Transport
    • Network
    • Data Link
    • Physical
  15. Application layer
    Provides a standard interface for applications that must communicate with devices on the network
  16. Presentation layer
    • Transforms data to provide a standard interface for the app layer
    • Provides common communication services (encryption, text compression and reformatting)
    • Converts outgoing data into a format acceptable to the network layer and passes to session layer
    • Incoming data is rec from session layer and converted to a format acceptable by the app layer
  17. Session layer
    • Controls the dialogs (sessions) between computers 
    • All conversations, data exchanges, and dialogs between app layers are managed by session layer
  18. Transport layer
    • Provides reliable and transparent transfer of data between end-points
    • End to end error recovery and flow control
    • Ensures all data sent by session layer are received by remote system's transport layer
    • Acknowledges info received from remote transport layer for every packet sent
  19. Network layer
    • Creates a virtual circuit between the local and remote transport layers
    • Understands IP addresses
    • Prepares packets for data link layer by converting to frames
    • Converts receiving frames to packets
  20. Data link layer
    • Provides for reliable transfer of data across physical link
    • Receives packets of data from network layer, encapsulates them into frames and sends as bit streams to physical layer
    • Error detection through Cyclic redundancy check for each frame
    • MAC addresses
  21. Physical layer
    Provides the hardware that transmits and receives bit streams
  22. TCP/IP Layers
    • Application
    • Transport
    • Network Interface
    • LAN/WAN Interface
  23. TCP/IP to OSI Match UP
    • Application - Application, Presentation, Session
    • Transport - Transport
    • Network interface - Network
    • LAN Interface - Data link, Physical
  24. Advantages of Switches compared to Hubs
    • Private path for each connection
    • No collisions
    • Each device can only see its traffic
  25. Repeaters (OSI)
    • Physical
    • Extend the range of a network, or connect two network segments
  26. Attenuation
    Signal is distorted or reduced
  27. Hubs (OSI)
    • Physical
    • Serve as the center of a star network
    • Can be active, repeat signals
    • Passive, split signals
  28. Bridges (OSI)
    • Data link
    • Connects or creates two separate LANs
    • Reduces collision domains
    • Two segments below data link, one above that layer
    • Software based
  29. Layer 2 switches
    • Data link
    • Divide and interconnect network segments
    • Reduce collision domains
    • More functionality than bridges 
    • Hardware based
  30. Routers (OSI)
    • Network
    • Link two or more physically separate networks
    • Segments remain logically separate 
    • Examine IP addresses
    • Generally software based and not as efficient as switches 
    • Examine every packet
  31. Layer 3 and 4 Switches
    • Network/Transport
    • Like a router at layer 3
    • Compares destination IP to list and calcs best route (virtual circuit created)
    • Uses hardware
  32. VLAN
    • Group of devices on one or more logically segmented LANs.
    • Set up by configuring ports on a switch, so that devices attached communicate as if they were attached to the same physical network segment
  33. Gateways (OSI)
    • Application layer
    • Protocol converters
  34. Simplex vs half-duplex vs full-duplex
    • Simplex - one way flow
    • Half-duplex - one way at a time
    • Full-duplex - both ways at one time
  35. Synchronous and Asynchronous transmissions
    • Synchronous - bits are transmitted w/o interruption at a constant speed. Char used to indicate start of data block
    • Asynchronous - beginning and end of transmission marked with a byte each
  36. Multiplexor
    • Physical layer
    • When a physical circuit has more bandwidth capacity than required by an individual signal.
    • Allocates portions of bandwidth
  37. Methods of Multiplexing
    • Time-division multiplexing - allocation based on preassigned time slots, doesn't matter if there is data to transmit
    • Asynchronous time division - allocate as needed, dynamically assigned slots
    • Frequency division - allocate based on the frequency of traffic
    • Statistical - allocated dynamically to any data channel w/ info to transmit
  38. Point-to-Point Protocol
    • Data link layer
    • Provides a single, pre-established communication path to remote network 
    • Standard for transmitting IP over serial lines
  39. X.25
    • Lower three layers of OSI (Network, Data link, physical)
    • Packet switched WAN protocol suite
    • Telecom standard that defines how connections between data terminal equipment and data communications or circuit terminating equipment are maintained for remote terminal access
  40. Frame relay
    • Data link protocol
    • Uses standard encapsulation technique to handle multiple virtual circuits between connected devices
    • Encapsulation method, high-level data link control
    • More efficient than X.25
    • Relies more on upper layer protocols for error handling
    • Low cost
  41. Two modes for IPSec
    • Tunnel mode - encrypts the entire packet, including header
    • Transport mode - encrypts only the data portion
  42. Simple Network Management Protocol (SNMP)
    • TCP/IP based protocol
    • Monitors and controls different variables throughout the network
  43. RPO
    • The acceptable data loss in case of disruption
    • Earliest point in time which it is acceptable to recover data
    • Amount of data that can be lost, e.g. four hours then data backed up every four hours
    • Higher RPO = longer time without data
  44. RTO
    • Determined based on the acceptable downtime in case of a disruption
    • Earliest point in time at which operations must resume
    • Lower time = higher costs
  45. Service Delivery Objective (SDO)
    Level of service to be reached during the alternate process mode until normal operations are restored
  46. DRP - Incident response team
    Designated to receive the information about every incident
  47. DRP - Information Security team
    • Main mission is to develop the needed steps to maintain a similar level of information and IT resource security as was in place at primary site.
    • Responsible for security of org assets
  48. Offsite storage team
    Responsible for obtaining, packaging and shipping media and records to the recovery facilities
  49. Relocation team
    Responsible for coordinating the process of moving from the hot site to a new location or the restored original
  50. Host based replication
    • Executed at the host level by software on the host and target. 
    • Synchronous - data not written to the primary until backup sends confirmation
    • Asynchronous - data transferred with some delay
  51. Difference between incremental backup and differential backup
    • Incremental - the data that was changed is backed up
    • Differential - full files and folders are backed up, what has changed
  52. Objective of Service-Level Management
    To negotiate, document and manage the services in the manner in which the customer requires those services
  53. System Classifications for Recovery
    • Critical functions - cannot be performed unless replaced by identical capabilities, cannot be replaced by manual methods
    • Vital - can be preformed manually for a short time
    • Sensitive - can be preformed manually at a tolerable cost for an extended time
    • Noncritical - can be interrupted for an extended period of time at little or no cost, little time to restore

What would you like to do?

Home > Flashcards > Print Preview